Documentation
Experience the future of threat intelligence analysis. Deploy FlowViz locally and transform static reports into interactive insights.
Quick Start
Clone the official FlowViz open-source repository and install dependencies to begin.
1. Clone Repository
2. Install Dependencies
3. Environment Setup
Generate your local environment file and provide your LLM API keys.
4. Launch
Core Workflow
Article Ingestion
Paste a URL from any security blog. Our engine identifies the core content and strips away noise.
AI Synthesis
FlowViz leverages advanced models to extract threat actors, techniques, and assets, mapping them instantly to MITRE ATT&CK.
Visual Analysis
Explore the resulting graph. Zoom into specific attack stages and analyze evidence extracted directly from the text.
Advanced Topics
Custom Extraction Logic
Modify extraction prompts and constraints in the core engine to adapt the analysis to your specific security team needs. Full source code access allows for deep refinement of the synthesis logic.